Secure Outsourcing Algorithm for Signature Generation in Privacy-Preserving Public Cloud Storage Auditing

被引:1
作者
Zhao, Pu [1 ]
Yu, Jia [1 ,2 ]
Zhang, Hanlin [1 ]
机构
[1] Qingdao Univ, Coll Comp Sci & Technol, Qingdao 266071, Shandong, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100093, Peoples R China
基金
中国国家自然科学基金;
关键词
public auditing; cloud storage; secure outsourcing; modular exponentiation; cloud computing;
D O I
10.6688/JISE.201905_35(3).0009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Public cloud storage auditing allows a file owner or a public verifier to conduct integrity checking without downloading the whole file from cloud server. Plenty of unaffordable modular exponentiations for resource-constraint devices are required on the client side in the process of signature generation for public cloud storage auditing. In this paper, we introduce a secure outsourcing algorithm to make cloud storage public auditing more feasible and practical for the computationally limited clients. Compared with the existing algorithms for secure outsourcing of modular exponentiations, the proposed algorithm designed for this scenario takes advantage of that the bases of modular exponentiations do not need to be protected. Therefore, our algorithm is efficient. Furthermore, the evaluation shows that it has high efficiency and checkability as well. Specifically, the client-side cost is reduced to 5.6% of the original computation cost, and the probability that the client detects the misbehavior of server is close to 1.
引用
收藏
页码:635 / 650
页数:16
相关论文
共 22 条
[11]   Security Challenges for the Public Cloud [J].
Ren, Kui ;
Wang, Cong ;
Wang, Qian .
IEEE INTERNET COMPUTING, 2012, 16 (01) :69-73
[12]  
Rivest R. L., 2001, P 7 INT C THEOR APPL, P554
[13]   Compact Proofs of Retrievability [J].
Shacham, Hovav ;
Waters, Brent .
JOURNAL OF CRYPTOLOGY, 2013, 26 (03) :442-483
[14]   Enabling Identity-Based Integrity Auditing and Data Sharing With Sensitive Information Hiding for Secure Cloud Storage [J].
Shen, Wenting ;
Qin, Jing ;
Yu, Jia ;
Hao, Rong ;
Hu, Jiankun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (02) :331-346
[15]  
Tian H., 2015, ASIA CCS '15, P417, DOI [DOI 10.1145/2714576.2714615, 10.1145/2714576.2714615]
[16]  
Wang BY, 2014, IEEE T CLOUD COMPUT, V2, P43, DOI [10.1109/CLOUD.2012.46, 10.1109/TCC.2014.2299807]
[17]  
Wang YJ, 2014, LECT NOTES COMPUT SC, V8712, P326, DOI 10.1007/978-3-319-11203-9_19
[18]   Intrusion-resilient identity-based signatures: Concrete scheme in the standard model and generic construction [J].
Yu, Jia ;
Hao, Rong ;
Xia, Hui ;
Zhang, Hanlin ;
Cheng, Xiangguo ;
Kong, Fanyu .
INFORMATION SCIENCES, 2018, 442 :158-172
[19]   Strong Key-Exposure Resilient Auditing for Secure Cloud Storage [J].
Yu, Jia ;
Wang, Huaqun .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2017, 12 (08) :1931-1940
[20]   Enabling Cloud Storage Auditing With Verifiable Outsourcing of Key Updates [J].
Yu, Jia ;
Ren, Kui ;
Wang, Cong .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2016, 11 (06) :1362-1375